Secure Distributed Web Gateway

SECURE DISTRIBUTED WEB GATEWAY

We take an unique approach towards a distributed gateway in security. It allows you to have comprehensive protection that you require in today’s world while being able to deliver the flexibility to scale up for the future. Complex security policies can be managed and delivered whenever you need it and it puts you in great control on configuring web security at the gateway.

Highlights

Delivers granular control over evasive applications such as Skype,TOR, SnapChat, by leveraging on the stream-based visibility over131k data channels where standard solutions only look at ports 80 and 443.

Allows you to monitor and manage the use of applications whether authorized or not, so to ensure regulatory compliance and as well as reducing the exposure to threats.

Shortens the time to detect and thus respond to threats in real-time with proper reporting. This also ensures compliance is achieved at best.

Features

We leverages on iboss patented, stream-based architecture to provide in-line visibility of all data channels and thus extending security across all applications.

Full web scans are done real-time so you know exactly what applications are accessed and by whom. Another good example of real-time visibility on all ports and protocols, is that it eliminates blind spots and thus able to detect evasive malware and protocols.

SSL is created to provide additional security for the data on the internet which is widely used in the financial, healthcare industries. Today, we see this commonly used almost everywhere in the internet and the applications. While encrypted SSL was designed to add security, it is also a fact that this creates blind spots for cyber criminals to exploit. We provides iboss selective decryption and as well as granular SSL traffic management to better control the SSL encryption/decryption policies per required which can also prevent latency in traffic.

Granular social media scanning helps managing policies easier as traditional platform is more towards forcing an all or nothing approach. We can now control the access to whatever we need as per the security policies. Google portfolio of applications continues to grow and we do see the need to manage different google applications. Access can be given for selected group in the organization or for certain applications. This is yet again another powerful example of having proper granular controls.

With more workers on mobility, we can expect the users on BYOD to surge up for each and every enterprise. How do we ensure that all their devices are constantly monitored and protected?

Customized captive portal automatically binds the users to directory services on both wired or wireless connections.

We predictably with your business as it grows, delivering the capabilities and capacity you need, when you need them. It’s the utmost in gateway security with the least amount of risk, disruption, implementation time, and total cost of ownership , Secure Distributed Gateway Platform is designed to meet the bandwidth demands of today while providing the foundation and flexibility for tomorrow’s requirements.